Glad Unifi has finally added this feature. Well delivered and easy to understand Avi.
@TechMeOut5Күн бұрын
Thanks for watching Tony! I hope you are doing well.
@WunderTechTutorials19 сағат бұрын
Been using this for a little over a week with the RC update and it's awesome! Great video, Avi! Loved seeing another point of view on it.
@TechMeOut515 сағат бұрын
Thank you so much! I am glad that you are enjoying the new features and thanks for watching buddy
@evenacona2 күн бұрын
Thanks for making the video - ZBF is awesome as long as all the VLANs are managed by the UDM. The moment you are using VLAN's routed by a Unifi L3 switch they are just thrown into the 'External' zone and there is no way to add them to a zone at all ...
@whiskerjones96622 күн бұрын
This is a self-inflicted problem. If you're using UniFi L3 switches to route VLANs instead of the UDM, you're deliberately bypassing your security appliance. Of course those VLANs show up as "External" - from the UDM's perspective, that traffic isn't under its control anymore. Unless you can clearly articulate why you need L3 switching (with actual throughput numbers to back it up), you're likely overcomplicating your network and compromising your security posture for no real benefit. Let your gateway be a gateway and your switches be switches.
@evenacona2 күн бұрын
@@whiskerjones9662 Without going into all the details, simply a case of having a lot of 25Gb connected devices in my setup (30+). By having the UDM manage the VLAN routing vs my Aggregation Pro's, unless I put all 25Gb devices on the same VLAN, the inter vlan route will force all traffic up the 10Gb UDM pipe to be routed even between VLAN's on the same Agg pro, which would slam the UDM.
@ggarp48062 күн бұрын
Great video. Can’t wait for this to be out of the beta phase. I don’t know about the USW issue, but ubiquiti is making some amazing moves as of the last year. I’m sure they’ll get this feature fixed for use with the USW.
@jeffnew1213Күн бұрын
It looks like the ability to turn rules on and off (for testing or temporarily changing a restriction) is missing. Can you confirm this? If missing, seems like an oversight on Ubiquiti's part.
@marksamuels6293Күн бұрын
It’s not missing, it is present in the zone based firewall
@driver288Күн бұрын
You can see the pause feature if you click manage and then tick the rule you want to alter state on
@jeffnew1213Күн бұрын
@@driver288 Great! Thank you.
@jeffnew1213Күн бұрын
@@marksamuels6293 Excellent. Thank you.
@domadoxКүн бұрын
It seems that this feature is not available on all UCG or UXG/UCK models. Are you aware of any specific limitations regarding this?
@TechMeOut5Күн бұрын
Certain devices have a different cadence. Im pretty sure that this will be available on all platforms and sooner than later it will become the new default
@ronald012222 сағат бұрын
can you make a video about dns shield. i see nobody using it
@GingerTechIT14 сағат бұрын
Its great for basic secure DNS..i used to use it but now use NextDNS DNS provider so needs to be disabled. Only reason i use the provider is so i have more granular control over my traffic coming in.
@RupertoCamarenaКүн бұрын
Could you make a video explain how pihole or adguard work in unifi?
@TechMeOut5Күн бұрын
Hi. To be honest, I'm failing to understand the question. Adguard and pihole are applications that filter dns queries. What's the connection to unifi?
@rayk322 күн бұрын
Great explanation. Thanks!
@driver288Күн бұрын
Hmm the rules you created for blocking traffic were completely unnecessary since the block all rule already take care of what you wanted to accomplish. On the other hand you created them as a demo on how to create rules without changing anything, that is what you did. It seems like the block all rule is automatically created when you create the zone.
@TechMeOut5Күн бұрын
Hi. The main focus was the rule creation and how to use the matrix to help administer them. That was the main goal.
@Volt-ImperiumКүн бұрын
Not using dark mode should be a crime 😂
@pauldunecatКүн бұрын
Welcome to the 20th century Ubiquiti with the ZoneBased firewalling! 🙂